Published:2024/10/31  Last Updated:2024/10/31

JVN#87770340
Stack-based buffer overflow vulnerability in multiple Ricoh laser printers and MFPs which implement Web Image Monitor

Overview

Multiple Ricoh laser printers and MFPs (multifunction printers) which implement Web Image Monitor contain a stack-based buffer overflow vulnerability.

Products Affected

  • Specific products and versions which implement Web Image Monitor
As for the details of affected product names and versions, refer to the information provided by the developer.

Description

Web Image Monitor provided by Ricoh Company, Ltd. is an web server included and runs in Ricoh laser printers and MFPs (multifunction printers).
Web Image Monitor contains a stack-based buffer overflow vulnerability (CWE-121) due to inappropriate parsing process of HTTP request.

Impact

Receiving a specially crafted request created and sent by an attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition.

Solution

Update Web Image Monitor
Update Web Image Monitor to the latest version according to the information provided by the developer.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score: 9.8
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)

Credit

Zhihong Tian, Hui Lu, Guocheng Wu, and Xingchi Chen of the Cyberspace Advanced Technology Institute of Guangzhou University reported this vulnerability to Ricoh Company, Ltd. directly and coordinated. After the coordination, Ricoh Company, Ltd. reported this case to IPA under Information Security Early Warning Partnership, and JPCERT/CC coordinated with Ricoh Company, Ltd. for JVN publication.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2024-47939
JVN iPedia JVNDB-2024-000117